SØG - mellem flere end 8 millioner bøger:
Viser: The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk
The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk
N. K. McCarthy, Matthew Todd og Jeff Klaben
(2012)
Detaljer om varen
- Paperback: 240 sider
- Udgiver: McGraw-Hill Education (September 2012)
- Forfattere: N. K. McCarthy, Matthew Todd og Jeff Klaben
- ISBN: 9780071790390
Uncertainty and risk, meet planning and action.
Reinforce your organization's security posture using the expert information contained in this tactical guide. The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk shows you how to build and manage successful response plans for the cyber incidents that have become inevitable for organizations of any size. Find out why these plans work. Learn the step-by-step process for developing and managing plans built to address the wide range of issues organizations face in times of crisis.
- Contains the essentials for developing both data breach and malware outbreak response plans--and best practices for maintaining those plans
- Features ready-to-implement CIRPs--derived from living incident response plans that have survived the rigors of repeated execution and numerous audits
- Clearly explains how to minimize the risk of post-event litigation, brand impact, fines and penalties--and how to protect shareholder value
- Supports corporate compliance with industry standards and requirements, including PCI, HIPAA, SOX, and CA SB-24
Part 1: The Threat Landscape
Ch 1Introduction to Planning & Crisis
Ch 2The Nebulous Standard of Cyber Due Diligence & The New Era of Information Risk
Part 2: Planning for Crisis
Ch 3A Plan is Preparation Manifested
Ch 4 Writing Your Computer Incident Response Plan
Part 3: Plan Development - Data Breach
Ch 5Your Data Breach CIRP - Incident Preparation
Ch 6Developing a Data Breach CIRP - Plan Execution
Ch 7Your Data Breach CIRP - Post Incident Planning & Maintenance
Part 4: Plan Development - Malware
Ch 8Your Malware Outbreak CIRP - Incident Preparation
Ch 9Your Malware Outbreak CIRP - Plan Execution
Ch 10Your Malware Outbreak CIRP - Post Incident Planning
Ch 11Closing Thoughts